timetracker
Self-hosted time tracking
Example
{config, ...}: {
nps.stacks.timetracker = {
enable = true;
secretKeyFile = config.sops.secrets."timetracker/secret_key".path;
db.passwordFile = config.sops.secrets."timetracker/db_password".path;
oidc = {
enable = true;
clientSecretFile = config.sops.secrets."timetracker/authelia/client_secret".path;
clientSecretHash = "$pbkdf2-sha512$...";
};
};
}Stack Options
nps.stacks.timetracker.containers.timetracker
Alias of {option}services.podman.containers.timetracker.
nps.stacks.timetracker.db.passwordFile
The file containing the PostgreSQL password for the database. Only used if db.type is set to "postgres".
nps.stacks.timetracker.db.type
Type of the database to use.
Can be set to "sqlite" or "postgres".
If set to "postgres", the passwordFile option must be set.
value "postgres" (singular enum)
"postgres"
nps.stacks.timetracker.db.username
The PostgreSQL user to use for the database. Only used if db.type is set to "postgres".
nps.stacks.timetracker.enable
Whether to enable timetracker.
nps.stacks.timetracker.oidc.adminGroup
Users of this group will be assigned admin rights
nps.stacks.timetracker.oidc.clientSecretFile
The file containing the client secret for the OIDC client that will be registered in Authelia.
For examples on how to generate a client secret, see
https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret
string
config.sops.secrets."immich/authelia/client_secret".path"
nps.stacks.timetracker.oidc.clientSecretHash
The client secret hash. For examples on how to generate a client secret, see https://www.authelia.com/integration/openid-connect/frequently-asked-questions/#client-secret
The value can be passed in multiple ways:
- As a literal string
- As an absolute path to a file containing the hash (
toFile) - As an absolute oath to a file containing the client_secret, in which case the hash will be automatically computed (
toHash) - As
null
If left unset (null), the client secret will be read from the file specified in the clientSecretFile option and hashed automatically before being passed to the Authelia container.
null or string or (submodule)
null
# Literal String:
"$pbkdf2-sha512$310000$cbOAIWbfz3vCVXIPIp6d2A$J0klwULa6TvPRCU1HAfuKua/dMKTl8gbTYJz2N73ejGUu0LUGz/y3kwmJLuKuAYGg3WQOT0q9ZzVHHUvpKpgvQ"
# Client secret hash stored in a file
{ fromFile = config.sops.secrets."immich/client_secret_hash".path; }
# Client secret stored in a file: Hash will be computed dynamically
{ toHash = config.sops.secrets."immich/client_secret".path; }
# Null (default): Hash will be computed automatically based on the clientSecretFile option
# Equivalent to { toHash = cfg.oidc.clientSecretFile; }
null
nps.stacks.timetracker.oidc.enable
Whether to enable OIDC login with Authelia. This will register an OIDC client in Authelia and setup the necessary configuration.
For details, see:
nps.stacks.timetracker.oidc.userGroup
Users of this group will be able to log in
nps.stacks.timetracker.secretKeyFile
Path to the file containing the secret key for flask